


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 12
Volume 12, Number 1, January - February 2015
- Yuhui Zhong, Bharat K. Bhargava, Yi Lu, Pelin Angin

:
A Computational Dynamic Trust Model for User Authorization. 1-15 - Robert Mitchell, Ing-Ray Chen:

Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems. 16-30 - Zhuo Lu, Wenye Wang

, Cliff Wang:
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming. 31-44 - Taeho Jung, Xiang-Yang Li, Meng Wan:

Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel. 45-57 - Sisi Duan, Sean Peisert

, Karl N. Levitt:
hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost. 58-70 - Pullamsetty Harika, Marreddy Nagajyothi, John C. John, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri
:
Meeting Cardinality Constraints in Role Mining. 71-84 - Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, Jin Zhong:

PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid. 85-97 - Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha

:
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. 98-110 - Rui Zhang, Jingchao Sun, Yanchao Zhang, Chi Zhang:

Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers. 111-124
Volume 12, Number 2, March - April 2015
- Elisa Bertino:

The State of the Journal Editorial. 135 - Goran Delac, Marin Silic

, Sinisa Srbljic:
A Reliability Improvement Method for SOA-Based Applications. 136-149 - Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino:

Context-Based Access Control Systems for Mobile Devices. 150-163 - Hisham A. Kholidy

, Fabrizio Baiardi
, Salim Hariri:
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks. 164-178 - David Megías

:
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints. 179-189 - Siru Ni, Yi Zhuang, Zining Cao, Xiangying Kong:

Modeling Dependability Features for Real-Time Embedded Systems. 190-203 - Reza Entezari-Maleki

, Kishor S. Trivedi, Ali Movaghar
:
Performability Evaluation of Grid Environments Using Stochastic Reward Nets. 204-216 - Ousmane Amadou Dia, Csilla Farkas:

Risk Aware Query Replacement Approach for Secure Databases Performance Management. 217-229 - Saravanan Sundaresan, Robin Doss

, Selwyn Piramuthu, Wanlei Zhou
:
Secure Tag Search in RFID Systems Using Mobile Readers. 230-242 - Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Arun Iyengar:

VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing. 243-255
Volume 12, Number 3, May - June 2015
- Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab

:
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks. 256-269 - Andrea Ceccarelli

, Leonardo Montecchi
, Francesco Brancati, Paolo Lollini
, Angelo Marguglio
, Andrea Bondavalli
:
Continuous and Transparent User Identity Verification for Secure Internet Services. 270-283 - Michael Le, Yuval Tamir:

Fault Injection in Virtualized Systems - Challenges and Applications. 284-297 - Qi Li, Xinwen Zhang, Xin Zhang, Purui Su:

Invalidating Idealized BGP Security Proposals and Countermeasures. 298-311 - Juan E. Tapiador

, Agustín Orfila, Arturo Ribagorda, Benjamín Ramos:
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. 312-325 - Aditi Gupta, Javid Habibi, Michael S. Kirkpatrick, Elisa Bertino:

Marlin: Mitigating Code Reuse Attacks Using Code Randomization. 326-337 - Alex P. Klinkhamer

, Ali Ebnenasir:
On the Hardness of Adding Nonmasking Fault Tolerance. 338-350 - Sisi Liu, Loukas Lazos, Marwan Krunz:

Time-Delayed Broadcasting for Defeating Inside Jammers. 351-365 - Antonio Bovenzi, Francesco Brancati, Stefano Russo

, Andrea Bondavalli
:
An OS-level Framework for Anomaly Detection in Complex Software Systems. 366-372 - Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi:

On the Security of A Privacy-Preserving Product Calculation Scheme. 373-374
Volume 12, Number 4, July - August 2015
- Chin-Hsien Wu, Po-Han Wu, Kuo-Long Chen, Wen-Yen Chang, Kun-Cheng Lai:

A Hotness Filter of Files for Reliable Non-Volatile Memory Systems. 375-386 - Dongkyun Ahn, Gyungho Lee:

A Memory-Access Validation Scheme against Payload Injection Attacks. 387-399 - Lei Cen, Christopher S. Gates, Luo Si, Ninghui Li:

A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code. 400-412 - Linke Guo, Chi Zhang, Yuguang Fang

:
A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks. 413-427 - Ding Wang

, Debiao He
, Ping Wang, Chao-Hsien Chu
:
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. 428-442 - Phu H. Phung

, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan:
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content. 443-457 - Jia-Dong Zhang, Chi-Yin Chow

:
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. 458-471 - Robbert van Renesse, Nicolas Schiper, Fred B. Schneider:

Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab. 472-484 - Massimo Cafaro

, Roberto Civino
, Barbara Masucci:
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting. 485-490
Volume 12, Number 5, September - October 2015
- Tilo Müller, Felix C. Freiling:

A Systematic Assessment of the Security of Full Disk Encryption. 491-503 - Yuan Hong

, Jaideep Vaidya, Haibing Lu, Panagiotis Karras, Sanjay Goel:
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility. 504-518 - Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac

, Raheem A. Beyah
:
GTID: A Technique for Physical Device and Device Type Fingerprinting. 519-532 - Zhongyuan Xu, Scott D. Stoller:

Mining Attribute-Based Access Control Policies. 533-545 - Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:

New Publicly Verifiable Databases with Efficient Updates. 546-556 - Aravind Prakash, Eknath Venkataramani

, Heng Yin
, Zhiqiang Lin:
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution. 557-570 - Yiming Jing, Gail-Joon Ahn

, Ziming Zhao, Hongxin Hu:
Towards Automated Risk Assessment and Mitigation of Mobile Applications. 571-584 - Benjamin W. P. Ramsey, Barry E. Mullins, Michael A. Temple, Michael R. Grimaila:

Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation. 585-596
Volume 12, Number 6, November - December 2015
- Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:

Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. 602-614 - Xixiang Lv, Yi Mu, Hui Li:

Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs. 615-625 - Hannes Holm

, Khurram Shahzad, Markus Buschle, Mathias Ekstedt:
P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language. 626-639 - Wilko Henecka

, Matthew Roughan
:
Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases. 640-651 - Tilman Wolf

, Harikrishnan Kumarapillai Chandrikakutty, Kekai Hu, Deepak Unnikrishnan, Russell Tessier:
Securing Network Processors with High-Performance Hardware Monitors. 652-664 - Ahmed Bendahmane

, Mohamed Essaaidi
, Ahmed El Moussaoui, Ali Younes
:
The Effectiveness of Reputation-Based Voting for Collusion Tolerance in Large-Scale Grids. 665-674 - Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim

:
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. 675-687 - Lwin Khin Shar

, Lionel C. Briand, Hee Beng Kuan Tan:
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning. 688-707

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














